

CyberWire Daily
N2K Networks
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
Episodes
Mentioned books

Sep 21, 2024 • 20min
Hook, line, and sinker. [Research Saturday]
Jonathan Tanner, a Senior Security Researcher at Barracuda, dives into the world of sophisticated phishing attacks and advanced infostealer malware. He reveals how a recent phishing strategy cleverly uses ISO files to execute obfuscated scripts, extracting sensitive browser data and credentials. Tanner emphasizes the escalating complexity of cyber threats and the need for robust security measures. He also shares essential tips for recognizing phishing attempts, aiding listeners in enhancing their digital defenses against such cunning schemes.

Sep 20, 2024 • 28min
They really are watching what we watch.
Steve Blank, co-founder of the Gordian Knot Center for National Security Innovation at Stanford University, dives into the pressing issue of online surveillance and data privacy. He discusses insights from an FTC report on major social media's data practices and their implications for teen mental health. The conversation also highlights Ukraine's action against Telegram amid security concerns, the risks posed by cryptocurrency exchanges, and critical shifts needed in U.S. national security strategies to keep pace with technological advancements.

Sep 19, 2024 • 32min
Derailing the Raptor Train botnet.
The U.S. government disrupts a Chinese botnet linked to serious cyber threats. Ransomware targeting healthcare providers and phishing campaigns via GitHub are on the rise. A surprising Walmart scam is highlighted, revealing deceptive tactics used by cybercriminals. In a fascinating discussion, space security is explored, addressing the complexity of threats to space assets. The conversation includes the implications of counter space capabilities and the necessity for public awareness on these crucial issues.

Sep 18, 2024 • 24min
High-stakes sabotage.
Linda Betz, Executive Vice President of Global Community Engagement at FS-ISAC, sheds light on crucial cybersecurity practices for organizations at every maturity level. She discusses recent initiatives to counter rising disinformation campaigns and explains the importance of enhancing security measures in the financial sector. The conversation also covers the alarming increase in phishing attacks targeting Apple users and emphasizes the need for public awareness and deterrence strategies in cybersecurity.

Sep 17, 2024 • 25min
One small step for scammers.
A Chinese national faces charges for spear-phishing U.S. government employees, sparking discussions on cyber espionage. New sanctions target a spyware manufacturer while critical vulnerabilities in Google Cloud and D-Link routers come to light. Concerns about fake data breaches are rising. A cyberattack shakes a U.S. mining company, and the construction industry's accounting software is under threat. Tim Starks highlights challenges for the Postal Service ahead of elections, raising questions about mail reliability for voters.

Sep 16, 2024 • 32min
Agencies warn of voter data deception.
Recent warnings from the FBI and CISA dismiss claims about hacked voter data, highlighting the ongoing challenge of misinformation. The State Department reveals foreign influence operations, linking them to covert actions by RT. China is suspected of hacking a Pacific islands diplomatic organization. Insights into growing threats, particularly prompt injection attacks, are shared by an expert, while the consequences of online harm communities come to light. Meanwhile, 23andMe faces a hefty payout due to a major data breach.

Sep 16, 2024 • 24min
Breaking the information sharing barrier.
Errol Weiss, Chief Security Officer of HEALTH-ISAC and a key contributor to the N2K CyberWire Hash Table, discusses the vital need for information sharing in cybersecurity. He presents a compelling case for collaboration among organizations to tackle advanced threats. Weiss addresses legal and compliance challenges that hinder this sharing, emphasizing how executive leadership can foster a culture of cooperation. The conversation highlights the significant benefits of shared insights, including improved incident response and cost savings for all involved.

Sep 15, 2024 • 7min
Ben Yelin: A detour could be a sliding door moment. [Policy] [Career Notes]
Ben Yelin, Program Director for Public Policy and External Affairs at the University of Maryland, shares his path from political enthusiast to Fourth Amendment expert. He reflects on how crucial events like the 2000 election and 9/11 steered his interest in law and public policy. Ben discusses the hurdles facing defense contractors in achieving compliance with CMMC 2.0, and he emphasizes the value of mentorship in shaping his career in national security law. His goal is to elevate the debate surrounding cybersecurity and digital privacy.

Sep 14, 2024 • 16min
Spamageddon: Xeon Sender’s cloudy SMS attack revealed! [Research Saturday]
Alex Delamotte, a Threat Researcher from SentinelOne Labs, unveils the troubling rise of the Xeon Sender tool, a cloud-based hacktool facilitating SMS spam campaigns. He discusses its technical workings and alarming distribution on underground forums. The conversation highlights detection techniques for SMS abuse and cybersecurity best practices for organizations facing this modern threat. With SMS attacks on the rise, Delamotte emphasizes the urgent need for vigilance and effective monitoring to combat these malicious activities.

Sep 13, 2024 • 26min
Mini-breach, mega-hype.
Tim Starks, a cybersecurity journalist from CyberScoop, dives into alarming threats in the digital landscape. He discusses a recent Fortinet data breach and the arrest of a teenager linked to a Transport for London attack. The conversation highlights Russian hackers mimicking spyware vendors, exploiting eye-tracking technology for password theft. Starks emphasizes the critical need for improved hiring practices in the cybersecurity field as new vulnerabilities arise, underlining the ongoing challenges faced by the industry.


